| Main Talk | Main Track(Geomungo A+B) | |
| 08:00 - 09:00 | Registration | |
| 09:00 - 09:30 | Welcome & Introduction to POC2019 | |
| 09:30 - 10:30 | Liang Chen, "Exploiting IOSurface 0" | |
| 10:30 - 11:00 | Break Time | |
| Track A(Geomungo A) | Track B(Geomungo B) | |
| 11:00 - 12:00 | Gengming Liu & Jianyu Chen, "Chrome Exploitation" | Brian Pak,"Breaking Android Obfuscation By Applying BAOBAB" |
| 12:00 - 13:20 | Lunch | |
| 13:20 - 14:20 | Zhiyang Zeng, "Safari Adventure: A Dive into Apple Browser Internals" | Kushal Arvind Shah, "Software Zero-Day Discovery - How To? Targets/Seeds? Methods - Fuzzing, Reverse-Engg, 'Neither'??" |
| 14:30 - 15:30 | Cristofaro Mune & Niek Timmers, "Using Fault Injection for Turning Data Transfers into Arbitrary Execution" | Qian Chen, "Bug Hunting in Synology NAS" |
| 15:30 - 16:00 | Break Time | |
| 16:00 - 17:00 | Kang Li & Yan Zhang, "Checking Defects in Deep Learning AI Models" | Nafiez & Jaan Yeh, "Hunting Vulnerability of Antivirus product" |
| 17:10 - 18:10 | Denis Kolegov & Anton Nikolaev, "Machine learning implementation security in the wild" | Jaanus Kääp, "Attacking Hyper-V" |
| WhatEver Talk | Whatever Track(Daegeum Hall) | |
| 10:35 ~ | 조민주 & 이경민, "태블릿 기반 포인트 적립 시스템에 대한 보안 위협 모델링 및 해결방안 제시" | |
| 12:50 ~ | 정성균, "머신러닝 기반 악성코드 탐지 모델링 프로세스" | |
| 15:35 ~ | 이현수 & 지재형, "대한민국 유해사이트 차단방식의 현재와 미래" | |
| November 8, 2019 | ||
|---|---|---|
| 08:30 - 09:30 | Registration | |
| Track A | Track B | |
| 09:30 - 10:30 | Ryan Sherstobitoff, "Inside Hidden Cobra Cyber Offensive Programs" | Yongtao Wang & Yang Zhang & Kunzhe Chai, "A Whole New Perspective In SSRF: MAKE IT GREAT AGAIN AND Ignore Most Of SSRF DEFENSE SOLUTIONS THAT WE KNOWND" |
| 10:30 - 11:00 | Break Time | |
| 11:00 - 12:00 | JingLi Hao & Wanqiao Zhang, "Threat From The Satellite" | Aaron Adams, "How CVE-2018-8611 can be exploited to achieve privilege escalation on Windows 10 1809 and earlier" |
| 12:00 - 13:30 | Lunch | |
| 13:30 - 14:30 | Chao Zhang, "Revery: from POC to EXP" | Xpl017Elz, "KNOX Kernel Mitigation Bypasses (New Reliable Android Kernel Root Exploitation Part #2)" |
| 14:30 - 15:00 | Break Time | |
| 15:00 - 16:00 | Luca Todesco, "The One Weird Trick SecureROM Hates" | |
| 16:00 - 16:30 | Break Time | |
| 16:30 - 17:30 | James Forshaw, "Reimplementing Local RPC in .NET" | |
| 17:30 - 18:00 | Closing Ceremony | |
| 19:00 - 21:00 | Dinner Party for speakers, guests, attendees, and staffs | |
| 21:00 - | Drinking Hell (Only one crazy guy can survive!) | |
| WhatEver Talk | Whatever Track(Daegeum Hall) | |
| 10:35 ~ | 이태훈 & 오인경, "스마트TV 보안위협 식별 및 분석방법론 제시" | |
| 13:00 ~ | Jae-hwi Lee, "Building an automated system to de-obfuscate an API wrapping of Themida v3.0 by a taint analysis" | |
| 14:35 ~ | 장웅태 & 김민용, "유사도 기반의 재식별화 알고리즘을 통한 데이터 익명화 해제 방법" | |



Copyright(c) 2006 ~ Powerofcommunity All rights reserved.